6 Minute Read
The UK retail market has been thrown into turmoil in recent weeks, with three of that nation's highest-profile retailers being targeted allegedly by the well-known threat group Scattered Spider in at least one of the most disruptive incidents. Trustwave SpiderLabs has tracked Scattered Spider for more than a year and has created a detailed profile of the threat group, how it operates, its members, preferred targets, and has a long list of protective measures that an organization should have in place to help remain safe. Many of the indicators SpiderLabs has reported match the current situation impacting the UK retail sector. Marks & Spencer (M&S) confirmed on April 21 that it had been attacked, with Harrods and Co-op reporting similar incidents in the following days. M&S was forced to shut down contactless payments and click-and-collect orders, as well as delaying online deliveries, according to published reports. Harrods has claimed to have stopped an intrusion attempt and is operating normally. Another attack forced food retailer Co-op to disconnect certain systems earlier this week after experiencing attempts to gain unauthorized access to some of our systems. Only the M&S attack has been attributed to Scattered Spider. However, the timing and nature of the other attacks do bear some of the hallmarks of a Scattered Spider incident. The NCSC has issued a warning to all retailers to bolster their cybersecurity defenses in light of these events, emphasizing the need for vigilance and robust incident response plans as the investigations continue to unfold. All the information below is derived from a Trustwave SpiderLabs investigation into Scattered Spider. Trustwave SpiderLabs' in-depth research has found Scattered Spider, which is also known as UNC3944, Muddled Libra, 0ktapus, and Scattered Swine, to be exclusively motivated by financial gain. The consensus among researchers is that the group is comprised of relatively young threat actors reported to be between 17 and 22 years old, native English speakers, and primarily residing in Western countries. As we shall see, these traits will help the group during its initial access phase, which requires directly contacting employees to reach their targets. Law enforcement has had some success against the group with one known member, Noah Michael Urban, a 19-year-old from Florida, being arrested January 2024, by U.S. authorities and charged with wire fraud, aggravated identity theft, and conspiring to use SIM-swapping for cryptocurrency theft, according to the US Department of Justice. Scattered Spider is known to have ties to other threat groups, including Lap$us, 0ktapus, UNC3786, The Community, and the notorious BlackCat/ALPHV. Scattered Spider's target list is long, contains many distinguished names, and covers many industry verticals. These include retail, telcos (Verizon and T-Mobile,) hospitality (MGM Resorts International andCaesars Entertainment,) insurance, and healthcare. Geographically, many targeted organizations are in the US, but Scattered Spider has affected others in India, Canada, France, Sweden, and Australia, among other locations. Scattered Spider's core objective is to target large organizations, particularly those in the Fortune 2000, with valuable Intellectual Property (IP) or critical operations, increasing the likelihood of ransom payment. Software companies are frequently targeted for source code and code signing certificate theft. It also targets organizations that can serve as a pivot point for supply chain attacks, such as identity providers and their outsourced service companies. The group's latest monetization strategy involves deploying ransomware in victim environments, which appears to be what is happening in the UK retail sector. The group has specifically used BlackCat ransomware since mid-2023 and implements double extortion ransomware campaigns. This involves gaining access to a victim, taking data, and then threatening to publicly release it or further shut down the victim's systems if they are not paid. Scattered Spider employed this methodology in its attack against MGM Resorts and Ceasars. MGM refused to pay, and the company then suffered significant system outages costing approximately $100 million, while Caesars reportedly paid around $15 million and experienced less downtime. Scattered Spider's tradecraft and techniques involve a multi-stage approach, often starting with sophisticated social engineering and exploiting identity and access management systems. The group begins with phishing /smishing attacks. These include sending deceptive SMS messages (smishing) with links to phishing portals or Telegram messages impersonating IT personnel. It uses phishing kits like EIGHTBAIT (associated with its Oktapus campaign), which send captured credentials to Telegram channels. Recent attacks (since January 2024) use HR and Single Sign On themed lures. One tactic that relies on the group's language skills to gain login credentials is to call help desks or individual employees, impersonate company IT staff to manipulate them into resetting passwords, modify MFA factors, install Remote Monitoring and Management tools, navigate to fake login sites, or remove FIDO2 tokens. Scattered Spider is also known to purchase employee credentials or session tokens on underground markets and use SIM swap techniques that transfer victims' mobile phone numbers to attacker-controlled devices, often facilitated by access gained through compromised telecom or BPO organizations. The group offers significant amounts (up to $20,000 weekly) for SIM swaps. Even organizations that correctly have a Multifactor Authentication process in place are in danger as the group can bypass MFA through techniques like MFA bombing/push fatigue (repeatedly sending MFA requests until the user accepts) or exploiting vulnerabilities. Additionally, the group: Scattered Spider maintains persistence by abusing and controlling valid accounts and creating new user identities. It also modifies MFA tokens or registers new devices for MFA to maintain access and uses legitimate RMM tools, Citrix, and VPNs. Based on the detection opportunities and techniques described in the source, organizations should implement several defensive measures: 1. Strengthen Authentication and Access Control: 2. Enhance Monitoring and Logging: 3. Improve Endpoint and Network Security: 4. Security Awareness and Training: 5. Specific Cloud Environment Defenses: 6. Review and Secure DevOps Practices: By implementing these layered defensive measures, organizations can significantly reduce their risk of being compromised by Scattered Spider and similar threat actors. Trustwave is standing by to help any organization with concerns it is or may be impacted by Scattered Spider or any other threat group. Trustwave SpiderLabs has the skills and resources to hunt for threat actors in your environment. Trustwave’s Digital Forensics & Incident Response (DFIR) is ready to assist those looking to take additional proactive measures or who have been impacted by an incident and need to quickly contain the situation. Finally, Trustwave can help an organization further ensure it understands its exact security posture through Red Team exercises and as a penetration test provider. Background on the Recent Attacks
Who is Scattered Spider?
Scattered Spider's Modus Operandi?
Gaining Initial Access
Defending Against Scattered Spider